Method for acquiring operation log

A technique for running logs and obtaining methods, which is applied in the field of storage media containing the program, and can solve problems such as inability to process running log predictions, difficulty in obtaining running logs in software processing time order, and a large amount of manpower

Active Publication Date: 2008-06-11
CANON KK
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes it difficult to obtain a chronological run log of the entire software process
Therefore, since the entire processing operation log cannot be sufficiently predicted, a large amount of manpower is required to analyze the operation log in order to find the cause of the failure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for acquiring operation log
  • Method for acquiring operation log
  • Method for acquiring operation log

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0047] In this embodiment, when a given module calls a function that exists in another module, the input function address or the virtual function address table (Virtual Address Table) is used as a mechanism to connect the function calls between modules and record them. In the operation log, the processing of the entire software is acquired as a processing operation log in chronological order without adjusting the modules themselves of the software. Specific instructions are given below.

[0048]

[0049] FIG. 1 is a block diagram of a configuration of a computer (software evaluation system) implementing an operation log acquisition method of a preferred embodiment of the present invention. To simplify the description, this software evaluation system is built inside a PC. However, the operation log acquisition method of the present invention is effective regardless of whether it is constructed inside a PC or in a network system constructed of a plurality of PCs.

[0050] Th...

Embodiment approach

[0070] Figure 10 An example of a function definition file instructing the software evaluation system of the parameter and return value format of each function and method is shown. This file describes the DLL / interface name and function / method name ("function / method" refers to "function or method", which is also applicable to the description below), and the parameters and return value types corresponding to these functions / methods. The software evaluation system according to the operation log acquisition method of this embodiment determines the parameters / return values ​​of each function / method according to the content instructed by the function definition file, and obtains the content as an operation log.

[0071] Figure 11 show using Figure 10 The function definition file shown is an example of the obtained operation log of the software evaluation system implementing the operation log acquisition method according to the first embodiment of the present invention. Generat...

no. 2 example

[0074] The following second embodiment is directed to a method of acquiring operation logs designed to acquire functions whose function definition information has been specified in its C++ modified name, and in particular relates to directly creating a C++ function without additional user-defined function definition files. The operation log acquisition method for obtaining the operation log, thereby reducing the processing load needed to analyze the cause of the software failure.

[0075] According to this embodiment, the method first analyzes the tracked function name; if the function name is not in the form of a decorated name (decorated), then obtain the running log of the function in a normal manner; if the function name is a decorated name, then according to the compiled The decorator rule removes the modification to the modified name, and obtains the information (symbol) after the modification, and the information after the modification includes the function name and func...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a running log acquisition method, which is used for acquiring running logs of programs including a function which executes predefined process and a step changing the address of the loaded function which executes predefined process into the address of the function to acquire the running log; wherein the function to acquire the running log comprises the following steps: analyzing the traced function name firstly; if the function name is not in the form of C++ decoration name, the running log of the function is acquired in the normal mode; if the function name is C++ decoration name, the decoration is removed from the decoration name according to a compiler rule and the information after removing the decoration is acquired; the information after removing the decoration comprises the function name and function parameter information such as function parameter type, calling convention and function return type, etc.; the acquired information after removing the decoration is used as a function definition file to acquire the running log and displays the running log in the form after removing the decoration.

Description

technical field [0001] The present invention relates to a method for acquiring an operation log of a software program composed of a plurality of modules, a program for causing a computer to execute the method, and a storage medium containing the program. Background technique [0002] Traditionally, for software failures with a low recurrence rate, the causes of the failures have been found out and then resolved by acquiring and analyzing the processing operation logs of the software. [0003] However, there are the following problems in acquiring the above-mentioned existing processing operation logs. [0004] (1) In order to obtain the operation log, the modules of the software must be adjusted to increase the routine procedure for processing the operation log acquisition. Correspondingly, this will increase the job load for acquiring and processing operation logs. [0005] (2) Since the processing operation log is obtained for each module, the generated operation log is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
Inventor 韩劲胡欧
Owner CANON KK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products